Hi [[ session.user.profile.firstName ]]

Building a Personality Detection Application

In this video, Chris Madison, will do a deep dive into Watson's User Modeling service available on IBM Bluemix. The step by step demonstration will give developers a foundational application that can interact with a body of text and produce a personality portrait of the author. Using this service to score an author on the Big 5 personality traits has applications across industries for more deeply understanding a persons motivations, interests, and needs. Join Chris to get started with your own Watson powered application.
Recorded Dec 19 2014 18 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Madison, IBM
Presentation preview: Building a Personality Detection Application

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Thriving in a Hybrid IT Environment: Turning Data into Insight into Action Recorded: Dec 2 2016 17 mins
    Denny O'Brien, Program Director for IBM Operations Analytics offering management
    Today, consumerization of IT drives user expectations for new apps, richer analytics and support for every device under the sun, IT teams are under increasing pressure to deliver better than “five nines” for virtually every application imaginable, and to do so under a data deluge that shows no signs of abating. And the need is real; The Ponemon Institute estimates the average outage lasts about 90 minutes and costs $450,000!

    Attend this TechBytes series, presented by Slashdot Media and sponsored by IBM to learn how enterprises of all kinds are taking advantage of the latest in middleware tools to increase business agility, accelerate decision-making, and embrace hybrid environments to meet increasing user demand while reducing operating costs overall.  Attendees will learn:

    -How to leverage analytics to increase efficiency while improving reliability
    -Benefits of becoming proactive rather than firefighting application performance issues
    -How to apply cognitive predictive analytics to stop costly IT outages before they start.
    -Where to start when beginning to leverage ITSM in your environment
    -Why Telcos and other companies providing “dial-tone” reliability are utilizing advanced analytics tools in their ITSM portfolio to ensure uptime for even the most dynamic network infrastructure
  • Why Virtualization Just Doesn't Matter - Part 3 Recorded: Nov 14 2016 26 mins
    Prabu Rambadran, Director of Product Marketing & Mike McGhee, Sr. Technical Marketing Engineer
    Chances are you’ve already virtualized many – if not most – of your server workloads to get the most out of every IT hardware dollar. But as more companies adopt hybrid cloud and container based technologies, what role will virtualization play? 

    Is virtualization the new ‘checkbox’ for IT deployments, how does the evolution of virtualization, infrastructure and usage models impact your IT environment?
     
    At this 3 part TechBytes series we will cover
    •What role virtualization will provide in future systems?
    •How virtualization is evolving and what it means to you
    •What you should do now to plan for coming changes and new demands
  • Why Virtualization Just Doesn't Matter - Part 2 Recorded: Nov 14 2016 20 mins
    Prabu Rambadran, Director of Product Marketing & Mike McGhee, Sr. Technical Marketing Engineer
    Chances are you’ve already virtualized many – if not most – of your server workloads to get the most out of every IT hardware dollar. But as more companies adopt hybrid cloud and container based technologies, what role will virtualization play? 

    Is virtualization the new ‘checkbox’ for IT deployments, how does the evolution of virtualization, infrastructure and usage models impact your IT environment?
     
    At this 3 part TechBytes series we will cover
    •What role virtualization will provide in future systems?
    •How virtualization is evolving and what it means to you
    •What you should do now to plan for coming changes and new demands
  • Why Virtualization Just Doesn't Matter - Part 1 Recorded: Nov 14 2016 20 mins
    Prabu Rambadran, Director of Product Marketing & Mike McGhee, Sr. Technical Marketing Engineer
    Chances are you’ve already virtualized many – if not most – of your server workloads to get the most out of every IT hardware dollar. But as more companies adopt hybrid cloud and container based technologies, what role will virtualization play? 

    Is virtualization the new ‘checkbox’ for IT deployments, how does the evolution of virtualization, infrastructure and usage models impact your IT environment?
     
    At this 3 part TechBytes series we will cover
    •What role virtualization will provide in future systems?
    •How virtualization is evolving and what it means to you
    •What you should do now to plan for coming changes and new demands
  • Mobilizing IT: Delivering Mobile Applications Users Demand Recorded: Oct 12 2016 16 mins
    Peggy Ann Salz, CEO, MobileGroove
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobile Security from Platform to Device: What You Need to Know Now Recorded: Sep 23 2016 20 mins
    Scott Steinberg, CEO,TechSavvy Global
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobility, Cloud, and the Enterprise: Mobile Application Strategies for Today Recorded: Sep 23 2016 18 mins
    Scott Steinberg, CEO,TechSavvy Global
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobility vs. Security: Balancing Accessibility & Efficiency against Threats Recorded: Apr 14 2016 36 mins
    James Morrison, Computer Scientist with the Federal Bureau of Investigation
    In today’s application economy, IT and business units are focused on increasing employee effectiveness and driving customer loyalty with a broad range of new ‘mobile-first’ applications.

    Having ‘an app for that’ offers many benefits – consumer-like experiences, increased use of enterprise applications, support for mobile workforce and a global customer base, to name just a few. But with each new mobile app – and mobile user – comes another attack surface and possible source of data loss or regulatory infraction. What now?

    Attend this Slashdot webinar to hear our expert panel discuss the challenges facing IT, developers and DevOps teams today, and what enterprises of all sizes should be doing to ensure their applications and users aren’t at risk. Attendees will hear:

    -How MDM is evolving, and what that means to users and IT
    -Methods of controlling devices that access your network and apps – simply
    -Why provisioning matters, and how to accelerate onboarding and retiring of users and devices
    -How to give users secure corporate access while retaining their existing mobile experience
    -Why content is king – and how to collaborate securely no matter how large the group
    How to give access behind the firewall – without messy configuration settings or VPNs
  • Monitoring Docker Containers in a DevOps Context Recorded: Jan 26 2016 56 mins
    Chris Riley-DevOps analyst, Fixate IO & Faisal Puthuparackat-Sr Engineer, Druva
    DevOps teams are challenged with monitoring, tracking and troubleshooting issues in a context where continuous integration servers and DevOps tools emit their own logging data. Machine data can come from numerous sources, and CD tools may not agree on a common method. Once log data has been acquired, assembling meaningful real-time metrics such as the condition of your host environment, the number of running containers, CPU usage, memory consumption and network performance can be challenging
  • EMM in Action with MobileFirst Protect Recorded: Dec 28 2015 31 mins
    John Nielsen, IBM MobileFirst Protect
    In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy.
    This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise.

    Part 3, EMM in Action with MobileFirst Protect offers hands-on demonstration of EMM best practices, delivered by John Nielsen of Fiberlink (formerly MaaS360). Here, viewers will see exactly how to demonstrate the ROI of EMM.
  • EMM Platform Must-Haves for Harnessing Mobility ROI Recorded: Dec 22 2015 25 mins
    John Nielsen, IBM MobileFirst Protect
    In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy.

    This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise.

    Part 2, EMM Platform Must-Haves for Harnessing Mobility ROI gives viewers a real-world list of features and benefits that business should expect from their EMM solution. This presentation by John Nielsen of Fiberlink presents a laundry list that IT and business teams alike should use when sourcing an enterprise mobility management solution and discusses how and why each item fits into the big picture.
  • Mobile Security is More than Just Mobile Device Management (MDM) Recorded: Dec 21 2015 30 mins
    Jimmy Tsang, IBM MobileFirst Protect
    In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy.

    This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise.

    Part 1, Mobile Security is More than Just Mobile Device Management (MDM),

    Fiberlink expert Jimmy Tsang discusses the evolution of devices, applications and use cases that have led to the evolution of Mobile Device Management (MDM) into Enterprise Mobility Management (EMM) which takes a holistic view of device, user, application and back-end infrastructure, enabling end to end security in ways not previously available.
  • DevOps Tools in a Continuous Delivery Pipeline Recorded: Dec 10 2015 40 mins
    Chris Riley, DevOps Analyst
    Is your team ready for continuous code delivery? In today’s “there’s an app for that” environment, business units demand new and competitive features as quickly as they can think of them. However, even though the adjectives used to describe DevOps – release, speed, automation – are all about moving forward, doing so without an idea of where you’ve been or where you’re heading leads to unsustainable development operations.

    Attend this informative TechByte sponsored by Sumo Logic and presented by Slashdot Media to learn what is takes to make adoption of a DevOps strategy a success, and avoid the “DevOps didn’t work for us” lament.
    Attendees will learn:

    · How to gain visibility into your entire development pipeline
    · Methods for supporting faster release
    · What tools matter – and how to utilize them
    · The role of monitoring and how to achieve ‘single pane of glass’ views
    · Why legacy waterfall development can’t meet changing demands

    Don’t hesitate – register now for this timely event and learn how to increase agility of your development and operations teams.
  • Linux without Limits: Enterprise Scalability and Performance Recorded: Dec 3 2015 64 mins
    Dr. Angel Diaz, IBM VP of Cloud Technology & Architecture | Donna Dillenberger, IBM Fellow | Stepven Dickens, LinuxONE SME
    Open Source is growing like wildfire, and with it the popularity of Linux, the OS that increasingly drives how business interacts with the world. Linux’s popularity spans every industry, fueling increasing demand to exploit Linux in the enterprise for business-critical applications and for service providers anxious to offer enterprise-grade Linux to their cloud clients.

    This means new requirements that must be addressed to ensure Linux deployments are enterprise ready- -- that means capable of massive transaction volumes at unprecedented scale, and built not to fail or crack - ever. Getting it right means growth and opportunity. Getting it wrong means running hundreds or thousands of servers, adding cost, complexity, latency and vulnerability—and lost business. How to get it right? Attend this complimentary webinar presented by Slashdot Media to hear IBM Linux experts Donna Dillenberger, Angel Diaz and Steven Dickens discuss how to get from open source project to enterprise-grade Linux with IBM LinuxONE.

    Attendees will learn:
    •What’s driving the demand for Enterprise-grade Linux
    •How Ecosystem communities have come together to ensure open solutions
    •How to leverage the latest technology platform to turbocharge Linux and open source apps
    •New ROI models that enable seamless migration to LinuxONE platforms
    •What enterprises and service providers can do now to begin the journey to enterprise Linux

    Don’t hesitate – view this webinar now to see a live demo and learn how enterprise Linux can help your business today.
  • Quality Improvement –A DevOps for Middleware Scenario Recorded: Nov 20 2015 18 mins
    Marianne Hollier, IBM DevOps Solution Specialist
    Fingers wagging, eyes squinting –“Why didn’t you find this problem during testing?!”How many times have you been asked that, only to try to defend yourself with things like “we can’t test everything!” and “it’s a corner case”? Everyone knows you can’t improve quality by testing alone, so what can you do when your testing team is taking the blame for poor quality in production?

    Join us on this TechByte session where we will discuss practices and tools that will help improve your test effectiveness and overall quality.
  • An Innovation Idea - A DevOps for Middleware Scenario Recorded: Nov 20 2015 15 mins
    Anita Rass Wan, IBM WW Appliction Product Manager
    You can be a lean startup in an Enterprise! Through collaboration between development, test and operations, an innovative idea can be quickly delivered for customer feedback and reaction. Let’s find out how a team working within a large Enterprise can, in fact, be nimble and creative in getting innovations to market.
  • Are your apps SAFe? - A DevOps for Middleware Scenario Recorded: Nov 20 2015 21 mins
    Roger LeBlanc, IBM Systems Offering Manager
    Developing multi-tier applications introduces numerous challenges to teams and organizations; orchestrating work across teams that work and behave very differently, understanding cross-team dependencies so as to minimize risks, ensuring everyone’s backlogs are aligned to the same priorities, keeping teams focused on customer needs/feedback …. to highlight just a few.

    Join us on this TechByte session where we will share with you what we’ve seen customers do to handle these challenges.
  • Democratic DevOps! Recorded: Sep 25 2015 16 mins
    Marianne Hollier, IBM DevOps Solution Specialist
    A DevOps Middleware scenario for Development-driven situations

    Do you wonder how to increase collaboration between your Operations and Development teams in support of new multi-tier applications or changes to existing applications? Is your organization looking to leverage Agile and Lean techniques to accelerate software delivery, but struggles to move teams away from silo’d mentality and behavior? Is your organization looking to adopt a DevOps approach but is not sure how to start?

    If any of these questions sound familiar, join us on this TechByte session where we will discuss practices and tools that will help address these challenges.
  • Houston, we have a problem! Recorded: Sep 25 2015 25 mins
    Anita Rass Wan, IBM WW Appliction Product Manager
    In today’s 24/7 “on-line all the time” world where there is an app for everything, how do you keep all your systems running? How quickly can you react to unexpected system performance degradation? Can you monitor specific applications in production environments and pro-actively uncover/prevent the next big crisis? How do you get all these practitioners, experts and processes aligned to get production problems fixed quickly while keeping all systems stable?

    If your customer satisfaction and retention relies on your ability to quickly and efficiently deploy application fixes in complex production environments, join us on this TechByte session. We will discuss practices and tools that will help you get ahead of the curve so less time is spent reacting to crisis.
Pure Technology. Pure Engagement.
Slashdot Media is the global leader in professional technology communities and reaches a worldwide audience of over 42 million IT professionals and enthusiasts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Building a Personality Detection Application
  • Live at: Dec 19 2014 1:25 am
  • Presented by: Chris Madison, IBM
  • From:
Your email has been sent.
or close